The web is very noisy today about the recent attack on Google and other companies. Read all about it in our Security Insights Blog
Our MTIS alert here gives details of McAfee product coverage protection against the internet explorer zero-day vulnerability exploited as part of these attacks, and other related vulnerabilities and malware.
McAfee are actively tracking these incidents and will continue to provide updates as they become available.
If you are at all concerned that your company has been affected by this please contact your local technical support team or Support Account Manager for further assistance.
Message was edited by: Samantha Price - updated mtis link to latest bulletin on 1/16/10 6:07:27 PM CSTon 1/16/10 6:11:32 PM CST
McAfee Labs has raised the Global Threat Condition to 'Critical'. Microsoft has released "Microsoft Security Advisory (979352) Vulnerability in Internet Explorer Could Allow Remote Code Execution". This vulnerability is actively being exploited in the wild. Exploit code for this vulnerability has been made public.
For more information please see our threat centre.
AudioParasitics Episode 80 is now available: "Operation Aurora" Episode - Dave and Jim welcome McAfee's Joe Telafici and Dmitri Alperovitch to discuss technical aspects of the recent attack.
Click here to grab the podcast.
McAfee Labs Blog on Operation Aurora :-
How are McAfee customers protected from this attack?
McAfee DAT files (antivirus): Coverage will be provided for associated malware (as Exploit-Comele, Roarur.dr, and Roarur.dll in the 5862 DATs, released on January 15. Partial coverage is provided in the 5861 DATs for some components as Generic.dx!kwv, Generic Spy.e, Spy-Agent.ey, and Exploit-Comele.
Updated coverage information will be communicated through McAfee Security Advisories:
We've created a group dedicated to Operation Aurora information, discussion and questions. Further updates will be posted to the group instead of this thread.